< Prev 6 7 8 9 10 11 12 13 14 15 16 Next >
This is a custom EIGRP packet generator and sniffer developed to test the security and overall operation quality of this brilliant Cisco routing protocol. Using this tool requires a decent level of knowledge of EIGRP operations, packets structure and types, as well as the Layer 3 topology of an audited network.Developed in the process of writing "Hacking Exposed Cisco Networks" book.
East-Tec Eraser 2006
Keep what you do on your computer to yourself! Protect your data and privacy and remove all evidence of your computer and online activity with East-Tec Eraser 2006. The product goes beyond U.S. Department of Defense standards for the permanent erasure of digital information and easily removes every trace of sensitive data from your computer: Internet history, Web pages, pictures, unwanted cookies, chatroom conversations and all traces of files, confidential documents or mails deleted in the past.
Network Equipment Performance Monitor
NEPM is a very general, highly configurable, two part software system that monitors any type of logged data from IP networked equipment and reports it via E-mail and web pages. Current conditions and history from systems based on Windows NT/2000 and UNIX can be tracked and reported. Most major server, switch and router systems can be monitored, without running agents on the target systems. Many networks behind separate firewalls can be reported on at one central site, and hard-to-reach isolated nets can be accessed. NEPM itself is system independent and can be hosted on either a UNIX or WinNT system or a combination of these with equal ease. NEPM monitors and reports uptime, critical events such as intrusion attempts, access rates, bytes-transferred rates, and error rates of network nodes. Unique precursor event links drill down instantly to the causes of downtime, intrusion events, etc. Performance graphs highlight element throughput and error rate. Hardware and software sub-systems within nodes are tracked and reported separately but in a common format that makes possible direct comparison. True hardware uptime is reported so that hardware and software performance can be separated from that of the communications links and from each other. Summary reports and alerts aggregate a view of an entire network's status onto a single page. Reports are provided via web pages posted to a web server for instant access to results. E-mailed text alerts provide prompt notification of dangerous conditions. NEPM is managed via a browser interface, providing full local or remote control from anywhere on the network. Use NEPM to increase your network uptime, increase network security, monitor QOS and SLA's, and evaluate new equipment. Equipment monitored can be Windows or Linux/UNIX/FreeBSD servers, or any processor-based system that logs events to non-volatile storage and has a telnet/rlogin/ssh/IP stream-mode interface
ARP Tools is collection of libnet and libpcap based ARP utilities. It currently contains ARP Discover (arpdiscover), an Ethernet scanner based on ARP protocol; ARP Flood (arpflood), an ARP request flooder; and ARP Poison (arppoison), for poisoning switches' MAC address tables.
SECnology is a Real-Time Logs Management Software that allows the user to respond effectively to rising threats in the security environment by collecting, analyzing and graphically displaying all security event information, generated by multiple and heterogeneous security devices. SECnology provides a seamless picture of enterprise security, enhancing and simplifying the visibility of corporate networks.
move, is used to move the named files to trash directory under home directory of a user. It has proved, immensely helpful to me when it came to recovery of files.
TRIPP is a utility to rewrite incoming and outgoing IP packets. Since it can rewrite both headers and payload, it can be used to configure the tcp/ip stack behavior in order to perform various tasks mainly intended for network tests, simulations and development. It is configured via a small rule-based language, which allows the user to intercept packets, set arbitrary header values, increment or decrement numeric header fields, set an arbitrary payload, rewrite parts of the payload, or fragment, multiply, or drop packets. It is totally user-level and doesn't require any kernel module.
Tufin SecureTrack is a comprehensive auditing, monitoring and compliance solution for Firewall policies. SecureTrack's advanced change management and corporate policy enforcement capabilities mitigate risks associated with Firewall configuration changes, and enable compliance with the strictest regulations and standards. Real-time Monitoring SecureTrack continuously monitors Firewall policies, detecting and reporting any configuration change as soon as it is made. With Real-time monitoring, registered SecureTrack users receive detailed notifications on changes as they are made via email, SysLog and SNMP traps. SecureTrack analyzes the new configuration, and sends out detailed reports on the exact changes that were made, which administrator was responsible and which Firewalls were affected. Organizational Policy Compliance Organizational Policy Compliance enables effective tracking of Firewall policy changes for violations of the corporate policy, and dispatches real-time alerts as soon as such violations occur. In addition, SecureTrack can alert the Security Officer on suspicious and questionable policy changes. You can easily define what types of changes constitute breaches of your corporate policy. The Organizational Policy Compliance is configured through a rich set of audit rules, enabling a detailed policy specification. Graphical side-by-side comparison view SecureTrack provides you with a powerful side-by-side graphical view, highlighting the differences between any pair of policy versions. You can clearly identify which rules and objects were added, deleted or modified. Compliance with Regulations and Standards The past few years have been marked by a rise in government regulations and industry standards. SecureTrack improves security management procedures and processes, which are the fundamental requirements for IT security in the latest regulations and standards, including: > The Sarbanes-Oxley Act > The Basel Capital Accord (Basel II) > ISO 17799 / BS 7799 > HIPAA Increasing Uptime Network downtime is often caused by human error, especially when it comes to networking and security infrastructure. Keeping track of security policy changes will help you correlate network downtime with recent policy changes. The graphical comparison view enables quick identification of configuration errors, increasing your network uptime and delivering a high Return on Investment. Advanced Reporting SecureTrack's advanced reports complete the security management picture. You can use various criteria to query the policy revision database, and generate detailed custom reports. Advanced reports provide a complete accounting of security policy changes, detailing each Save and Install operation and its effects on the security policy. Reports can be scheduled to run periodically or triggered by specific policy change events, and support HTML, MHT or PDF formats. Advanced Rule Base Audit With the advent of SecureTrack, rule base auditing can now be highly automated to identify risks and vulnerabilities, remove un-used and expired rules, investigate historical rule changes and determine whether existing rules are configured according to the corporate policy. Rule Base Optimization SecureTrack monitors each Firewall's traffic logs and correlates the data in real-time with the rule base, to determine which rules were accessed at different points in time. This enables administrators to modify the rule base for optimal firewall performance, based on actual traffic. Enhanced Provisioning SecureTrack's user permissions can now be limited to specific Firewall Management servers or Provider-1 CMA's, enabling global policy monitoring and control for large enterprise customers and Managed Service Providers. Graphical policy view of historical revisions SecureTrack 2.2 enables a graphical view of the rule base and objects at any point in time, for increased visibility, error-correction and historical policy analysis. Full system backup and restore The product's entire database and configuration can backed up to a file and easily restored, for disaster recovery and easy platform migration.
Security Center Lite
Security Center is network security software for real-time intrusion detection and prevention that helps to protect networks from potential intruders, unauthorized network connections and malicious network activities. Security Center key features are: Online network discovery, Automatic threat and vulnerability monitoring, Manual or automatic protection against potential intruders, Proactive blocking on unauthorized network connections, Email and SNMP alerts forwarding, Daily and weekly email reports, Threats and vulnerabilities statistics, Database exporting capabilities and wireless networks support. The Lite version supports up to 100 nodes.
Trillian Password Recovery
Trillian Password Recovery is a tool that will instantly find all Trillian accounts on your computer, extract encrypted passwords and decode these passwords. All versions of Trillian are supported (both Trillian Basic and Trillian Pro versions). Passwords from all protocols are extracted in all profiles that are on the PC. The program supports recovery of passwords from external files.
Browse by category